>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到isomorphisms相关记录18条 . 查询时间(0.062 秒)
We study the local factor at p of the semi-simple zeta function of a Shimura variety of Drinfeld type for a level structure given at p by the pro-unipotent radical of an Iwahori subgroup. Our method...
These lectures describe Hecke algebra isomorphisms and types for depth-zero principal series blocks, a.k.a. Bernstein components Rs(G) for s = sχ = [T, χe]G, where χ is a depth-zero character on T(O...
In [eprint.iacr.org/2012/663] method of virtual isomorphisms of ciphers was applied for differential/linear cryptanalysis of AES. It was shown that AES seems to be weak against those attacks. That res...
Abstract: Using the classification and description of the structure of bisimple monogenic orthodox semigroups obtained in \cite{key10}, we prove that every bisimple orthodox semigroup generated by a p...
Abstract: A partial automorphism of a semigroup $S$ is any isomorphism between its subsemigroups, and the set all partial automorphisms of $S$ with respect to composition is the inverse monoid called ...
Abstract: We study the family of isomorphisms and strictly singular operators in mixed Tsirelson spaces and their modified versions setting. We show sequential minimality of modified mixed Tsirelson s...
This is the sixth part in a series of papers in which we introduce and develop a natural, general tensor category theory for suitable module categories for a vertex (operator) algebra. In this paper (...
Let Q(α) and Q(β) be algebraic number fields. We describe a new method to find (if they exist) all isomorphisms, Q(β) → Q(α). The algorithm is particularly efficient if the number of isomorphisms is o...
We examine when two maximal abelian algebras in the truncated Toeplitz operators are spatially isomorphic. This builds upon recent work of N. Sedlock, who obtained a complete description of the maxima...
Bezrukavnikov and Etingof introduced some functors between the categories O for rational Cherednik algebras. Namely, they defined two induction functors Ind_b, ind_\lambda and two restriction functors...
Ciphers y = C(x, k) and  = (, ) are isomorphic if there exists invertible computable in both directions map y « , x « , k « ....
At EUROCRYPT '96 J. Patarin introduced the Isomorphisms of Polynomials (IP) problem as a basis of authentication and signature schemes [4, 5]. We describe an attack on the secret key of IP with one...
In this paper we examine the hard problems underlying asymmetric pairings, their precise relationships and how they affect a number of existing protocols. Furthermore, we present a new model for the...
General method of side-channel attacks protection, based on random cipher isomorphisms is presented. Isomorphic ciphers produce common outputs for common inputs. Cipher isomorphisms can be changed i...
Let D be a connected symmetric digraph, ¡ a group of automorphisms of D, and A a finite abelian group with some specified property. We give an algebraic characterization for two A-covers of D ...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...